NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Ravage, Barbara – Campus Technology, 2012
Colleges and universities are running out of closet space. With the amount of data predicted to grow 800 percent by 2016, higher education faces a desperate race to develop strategies to store and manage the tidal wave of information. Unfortunately, many IT departments, particularly those in the public sector, have flatlining budgets--and no money…
Descriptors: Educational Finance, Financial Support, Computer Storage Devices, Information Storage
Raths, David – Campus Technology, 2011
Many university officials recognize the need to upgrade their older analog video surveillance systems. In a 2010 survey by "Campus Safety" magazine, half of university respondents expressed dissatisfaction with the quality and coverage of their current video surveillance systems. Among the limitations of analog closed-circuit television…
Descriptors: Video Technology, Internet, Computer Uses in Education, Technology Planning
Schaffer, Greg – Campus Technology, 2007
Managing resource usage and data delivery with virtualization devices is a staple of many of today's data infrastructures. By breaking the traditional direct physical access and inserting an abstraction layer, what one sees is what he/she gets, but the mechanics of delivery may be quite different. The reason for the increase in virtualization…
Descriptors: Higher Education, Computer Networks, Information Technology, Methods
Briggs, Linda L. – Campus Technology, 2006
"I saved my presentation in my personal drive on the server last night, but now I can't find it. It just seems to be gone. Can you get it back?" "It looks like the mail server is corrupted. When was the last backup?" These sorts of questions, whether from faculty, students, or IT staff, can be an IT nightmare, or they can set…
Descriptors: Computer Peripherals, Client Server Architecture, Information Technology, Higher Education
Panettieri, Joseph C. – Campus Technology, 2006
Simplifying and securing an IT infrastructure is not easy. It frequently requires rethinking years of hardware and software investments, and a gradual migration to modern systems. Even so, writes the author, universities can take six practical steps to success: (1) Audit software infrastructure; (2) Evaluate current applications; (3) Centralize…
Descriptors: Information Technology, Universities, Audits (Verification), Computer Software